
pwnii
@pwnwithlove
Followers
3K
Following
3K
Media
42
Statuses
519
bug bounty lover, breaking stuff on @yeswehack & worldcuping 🇫🇷 at @Hacker0x01 || organizer of @esnhack, trying to keep hacking underground || CVE-2023-44352
ଘ(∩^o^)⊃━☆:・゚✧*:・゚✧✯♡❀
Joined November 2021
today with @Brumens2 we received a 50,000€ reward for discovering a bug in a public program !! don't be shy, go hunt in public programs too.@yeswehack ʚ(。˃ ᵕ ˂ )ɞ
56
26
468
just dropped a new article about my current way of setting up an android bug bounty lab ヾ(˶ᵔ ᗜ ᵔ˶) . it’s the setup I use myself, and I’ve found nice web bugs on android apps with nothing more than a rooted pixel, frida, and some traffic interception.
yeswehack.com
Covering the pros and cons of emulators versus real devices, and how to configure Magisk, Burp, Frida, Medusa and other mobile hacking tools.
5
38
162
RT @yeswehack: Want to hack mobile applications? 📱. We’ve just published the ultimate guide to building an Android #BugBounty lab with emul….
yeswehack.com
Covering the pros and cons of emulators versus real devices, and how to configure Magisk, Burp, Frida, Medusa and other mobile hacking tools.
0
31
0
RT @yeswehack: In the latest #TalkiePwnii, @pwnwithlove takes on a Dojo challenge about predictable tokens & YAML deserialization in Python….
0
6
0
RT @albinowax: The whitepaper is live! Learn how to win the HTTP desync endgame. and why HTTP/1.1 needs to die:
http1mustdie.com
Upstream HTTP/1.1 is inherently insecure, and routinely exposes millions of websites to hostile takeover. Join the mission to kill HTTP/1.1 now
0
250
0
RT @yeswehack: In the latest #TalkiePwnii, @pwnwithlove dives into Hex Color Palette, a Dojo challenge she created 🎨. From XXE exploitation….
0
9
0
in lxml <= 5.3.2 with libxml2 2.12.x, XXE using parameter entities was possible due to libxml2 behavior - allowing indirect overrides of local DTDs. this worked even without resolve_entities, since libxml2 expanded parameter entities anyway :). it didn���t really make noise since.
What happens when a Dojo challenge collides with a library update? 🔍. The Hex Color Palette challenge used to rely on a specific XXE flow – until lxml changed the rules. Find out why our latest Dojo report includes two different payloads and reports that leak the same flag via
0
1
31
RT @yeswehack: Want to get more out of @CaidoIO for your #BugBounty workflow? There might be a surprise in the video. 🎁. In Part 2 of our….
0
11
0
RT @CristiVlad25: Good writing here by @yeswehack. When I get nostalgic on recon, I often 'dig' into the past using some variation of what'….
yeswehack.com
Learn and leverage the lessons of internet history: on the merits of archive-based recon plus some useful commands and tools for performing these techniques.
0
22
0
RT @yeswehack: 📱 Want to pwn Android apps from the inside? Let’s talk about Drozer, one of the most powerful tools for Android app security….
0
30
0
RT @yeswehack: In the latest episode of #TalkiePwnii, @pwnwithlove analyses Ruby Treasure, a Dojo challenge by @Brumens2 💎. From regex bypa….
0
3
0
RT @yeswehack: Know much about finding and exploiting path traversal or arbitrary file read vulnerabilities? 🤔. Learn practical attacks lev….
yeswehack.com
Know much about exploiting path traversal or arbitrary file read vulnerabilities? Learn some practical attacks for unearthing high impact, lucrative vulnerabilities.
0
9
0
i've made some android challenges - feel free to check them out if you're into that kind of stuff! they’re pretty rare in most CTFs :p. the last one is based on a real bug bounty I reported, and is linked to a real application I can control ;)
🚨 QUALIFIERS ARE NOW OPEN! . Good luck to all the challengers, the CTF will close tomorrow at 8 P.M (Paris time). ➡️ Join the Insurrection right here:
0
5
26
RT @yeswehack: Curious to find out how @CaidoIO could fit into your #BugBounty workflow? 🐞. In this special episode of #TalkiePwnii, @pwnwi….
0
12
0
RT @pentest_swissky: OwnAppV2, Proxying and Reversing a Flutter apk | BreizhCTF WU - @pwnwithlove .
pwnwithlove.com
Flutter detection Lorsque l’on décompile l'apk à l’aide de jadx, on voit clairement dans le MANIFEST.MF la présence de libflutter.so, indiquant que l’application utilise flutter. Lorsque l’on run...
0
38
0
i’m doing videos about writeups, i hope you’ll enjoy! this one is about python format string injection, and you can find more on the youtube channel ٩(^ᗜ^)و.
Curious about the solution to our Xmas Dojo chall? 👀. Watch episode 3 of #TalkiePwnii for the breakdown & pro hacking tips! @pwnwithlove demonstrates how to exploit a Python format string injection using insecure exception handling 🐍. #BugBountyTips.
0
4
30
RT @yeswehack: 📱 Want to find bugs in Android apps? Android apps are often included in our scopes. Frequently overlooked, they offer some v….
0
16
0
a few weeks ago, I received an award for a critical vulnerability submitted on @yeswehack -- Path Traversal (CWE-22) (˵>ᗜ<˵)! !! . this thread is literally how I discovered this vulnerability :p
Have you ever seen an HTTP response embedded directly in the body of your request?. Check out these tips to discover how and where to find (internal) path traversal vulnerabilities! 👇. #YesWeRHackers #BugBountyTips.
8
1
79